The result was delete. Courcelles 05:03, 4 January 2011 (UTC) reply
A newly invented Cryptographic Hash Function with no independent sources provided and none available that I could find - in particular, it has never been peer-reviewed or subjected to security analysis as far as I can tell. Most of the article is opaque source code. Cryptographic hashes are generally not notable unless they are in wide use, and this is not; based on what I have read of the hashing method it most likely never will be in wide use. As such, this is just promotional material. — Gavia immer ( talk) 01:09, 28 December 2010 (UTC) reply
The result was delete. Courcelles 05:03, 4 January 2011 (UTC) reply
A newly invented Cryptographic Hash Function with no independent sources provided and none available that I could find - in particular, it has never been peer-reviewed or subjected to security analysis as far as I can tell. Most of the article is opaque source code. Cryptographic hashes are generally not notable unless they are in wide use, and this is not; based on what I have read of the hashing method it most likely never will be in wide use. As such, this is just promotional material. — Gavia immer ( talk) 01:09, 28 December 2010 (UTC) reply